Obserwuj
Warusia
Tytuł
Cytowane przez
Cytowane przez
Rok
Intrusion detection based on K-Means clustering and Naïve Bayes classification
Z Muda, W Yassin, MN Sulaiman, NI Udzir
2011 7th international conference on information technology in Asia, 1-6, 2011
1952011
ANOMALY-BASED INTRUSION DETECTION THROUGH K-MEANS CLUSTERING AND NAIVES BAYES CLASSIFICATION
W Yassin, NI Udzir, Z Muda, MN Sulaiman
Proceedings of the 4th International Conference on Computing and Informatics …, 2013
1242013
Cyber-security incidents: a review cases in cyber-physical systems
MN Al-Mhiqani, R Ahmad, W Yassin, A Hassan, ZZ Abidin, NS Ali, ...
International Journal of Advanced Computer Science and Applications 9 (1), 2018
1192018
A K-Means and Naive Bayes learning approach for better intrusion detection
Z Muda, W Yassin, MN Sulaiman, NI Udzir
Information technology journal 10 (3), 648-655, 2011
992011
A cloud-based intrusion detection service framework
W Yassin, NI Udzir, Z Muda, A Abdullah, MT Abdullah
Proceedings Title: 2012 International Conference on Cyber Security, Cyber …, 2012
822012
A review of insider threat detection: Classification, machine learning techniques, datasets, open challenges, and recommendations
MN Al-Mhiqani, R Ahmad, Z Zainal Abidin, W Yassin, A Hassan, ...
Applied Sciences 10 (15), 5208, 2020
772020
Intrusion detection based on k-means clustering and OneR classification
Z Muda, W Yassin, MN Sulaiman, NI Udzir
2011 7th International Conference on Information Assurance and Security (IAS …, 2011
732011
Improving Intrusion Detection Using Genetic Algorithm
WY Vahid Moraveji Hashemi, Zaiton Muda
Information Technology Journal 12 (11), 2167-2173, 2013
382013
K-Means Clustering and Naive Bayes Classification for Intrusion Detection
Z Muda, W Yassin, MN Sulaiman, NI Udzir
Journal of IT in Asia 4 (1), 13-25, 2014
372014
MACHINE LEARNING TECHNIQUES FOR INTRUSION DETECTION SYSTEM: A REVIEW.
S Juma, Z Muda, MA Mohamed, W Yassin
Journal of Theoretical & Applied Information Technology 72 (3), 2015
302015
Signature-Based Anomaly intrusion detection using Integrated data mining classifiers
W Yassin, NI Udzir, A Abdullah, MT Abdullah, H Zulzalil, Z Muda
2014 International symposium on biometrics and security technologies (ISBAST …, 2014
272014
New insider threat detection method based on recurrent neural networks
MN Al-Mhiqani, R Ahmad, ZZ Abidin, W Yassin, A Hassan, ...
Indones. J. Electr. Eng. Comput. Sci 17 (3), 1474-1479, 2020
242020
Cloud forensic challenges and recommendations: A review
W Yassin, MF Abdollah, R Ahmad, Z Yunos, A Ariffin
OIC-CERT Journal of Cyber Security 2 (1), 19-29, 2020
202020
A new taxonomy of insider threats: an initial step in understanding authorised attack
MN Al-Mhiqani, R Ahmad, ZZ Abidin, WM Yassin, A Hassan, ...
International Journal of Information Systems and Management 1 (4), 343-359, 2018
192018
A HYBRID FRAMEWORK BASED ON NEURAL NETWORK MLP AND K-MEANS CLUSTERING FOR INTRUSION DETECTION SYSTEM
WY Mazyar Mohammadi Lisehroodi, Zaiton Muda
Proceedings of the 4th International Conference on Computing and Informatics …, 2013
18*2013
Identify of Factors Affecting Information Security Awareness and Weight Analysis Process
RA Issam Al-Shanfari, Warusia Yassin
International Journal of Engineering and Advanced Technology 9 (3), 534-542, 2020
17*2020
Clustering analysis for malware behavior detection using registry data
NA Rosli, W Yassin, MA Faizal, SR Selamat
International Journal of Advanced Computer Science and Applications (IJACSA …, 2019
152019
Packet Header Anomaly Detection Using Statistical Analysis
W Yassin, NI Udzir, A Abdullah, MT Abdullah
Springer, 2013
152013
Rentaka: A novel machine learning framework for crypto-ransomware pre-encryption detection
WZA Zakaria, MF Abdollah, O Mohd, SMWMSMM Yassin, A Ariffin
International Journal of Advanced Computer Science and Applications 13 (5), 2022
122022
An Improved Fully Homomorphic Encryption Scheme for Cloud Computing
R Baharon, Q Shi, F Abdollah, W Yassin, A Idris
International Journal of Communication Networks and Information Security …, 2018
92018
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20